Electromagnetic Side-Channel Attacks and Potential Countermeasures
Offered By: CAE in Cybersecurity Community via YouTube
Course Description
Overview
Explore electromagnetic side-channel attacks and potential countermeasures in this 28-minute lecture by Tristen Mullins from the University of South Alabama. Delve into cryptographic algorithms, power versus electromagnetic side-channels, and localized electromagnetic analysis. Learn about differential EM analysis, trace collection techniques, and the importance of probe placement and pre-processing. Discover methods for aligning traces, including static alignment, and examine various side-channel countermeasures. Gain insights into EMA countermeasures, spatial randomization for localized EM, and moving target defense strategies. Conclude with an overview of ongoing work in this critical area of cybersecurity.
Syllabus
Intro
Cryptographic Algorithms
Power vs EM Side-Channels
Localized EMA
Electromagnetic SCA Attacks
Differential EM Analysis
Trace Collection: Localized EM
Trace Collection: Probe Placement
Trace Collection: Pre-Processing
Aligning Traces
Static Alignment
Side-Channel Countermeasures
EMA Countermeasures
Localized EM: Spatial Randomization
Moving Target Defense
Ongoing Work
Taught by
CAE in Cybersecurity Community
Related Courses
Applied CryptographyUniversity of Colorado System via Coursera Physical and Advanced Side-Channel Attacks
Graz University of Technology via edX Cryptography Application
Pluralsight Cryptography Principles for IT Professionals and Developers
Pluralsight Cryptography for SSCP®
Pluralsight